You are here

Cybersecurity

(TLP:CLEAR) H2OSecCon 2025: Successfully Enhancing Water and Wastewater Sector Security

Summary: WaterISAC is thrilled to share that our recent virtual conference, H2OSecCon, was a tremendous success. The event brought together a vibrant community of thought leaders, professionals, and change-makers from across the sector. The variety of speakers delivered powerful insights, innovative ideas and actionable takeaways.

(TLP:CLEAR) Cybersecurity Fundamentals for Water and Wastewater Utilities - Archive

UPDATE - December 2024

On December 18, 2024, WaterISAC unveiled the fourth and final set of three of its newly updated 12 Cybersecurity Fundamentals for Water and Wastewater Utilities to members during this month's Cyber Resilience Briefing. As part of a concerted effort to provide the water and wastewater systems sector with the most up-to-date guidance, WaterISAC is excited to officially bring this refresh together in it's entirety. 

(TLP:CLEAR) CISA ICS Advisories, Additional Alerts, Updates, and Bulletins – May 8, 2025

The Cybersecurity and Infrastructure Security Agency (CISA) has published the following ICS security advisories, along with additional alerts, updates, and bulletins:

ICS Advisories:

On May 8, 2025, CISA Released Five Industrial Control Systems Advisories for products used across multiple sectors. Please check these latest advisories for specific equipment used across your ICS/SCADA environments and address accordingly:

(TLP:CLEAR) CISA Fact Sheet: Primary Mitigations to Reduce Cyber Threats to Operational Technology

Summary: This week, CISA, the FBI, EPA, and the Department of Energy (DOE) published a fact sheet urging critical infrastructure entities with operational technology (OT) and industrial control systems (ICS) to implement five primary mitigations that will strengthen their cybersecurity. The authoring organizations urge critical infrastructure entities to review this fact sheet and act now to improve their cybersecurity posture against active cyber threat activities specifically and intentionally targeting internet connected OT and ICS.

Pages

Subscribe to Cybersecurity